2026 Best Software Awards are here!See the list
Inactive Profile: Need Admin Access?
No one has managed this profile for over a year.
If you work at Data Rover EP, reclaim access to make changes.
Data Rover EP

By Data Rover Ltd

Re-claim Profile

Re-claim your company’s G2 profile

This profile hasn’t been active for over a year.
If you work at Data Rover EP, you can re-claim it to keep your company’s information up to date and make the most of your G2 presence.

    Once approved, you can:

  • Update your company and product details

  • Boost your brand's visibility on G2, search and LLMs

  • Access insights on visitors and competitors

  • Respond to customer reviews

  • We’ll verify your work email before granting access.

Re-claim
4.5 out of 5 stars
3 star
0%
2 star
0%
1 star
0%

How would you rate your experience with Data Rover EP?

It's been two months since this profile received a new review
Leave a Review

Data Rover EP Reviews & Product Details

Data Rover EP Media

Data Rover EP Demo - Data Rover Dashboard
Like a "mission control room" of your company storage resources, the Data Rover Dashboard gives you high level information and statistical insights at a glance.
Data Rover EP Demo - Data Rover Data Analytics
Allows for simple and clear control over the effective permissions. Check for security flaws and eliminate issues. Simplify the management of permissions and the protection of data.
Data Rover EP Demo - Data Rover Dark Data Analysis
Data Rover makes work faster and safer by optimising the storage resources usage and reducing costs. dentify the junk data and provides statistical information allowing you to evaluate the impact this data has on the infrastructures and then free up space. Improve the efficiency and security of t...
Data Rover EP Demo - Data Rover File Auditor
File Auditor essentially determines who did exactly what, from where and when. It gives you the proof that something was done. Right or Wrong it's not important - JUST the FACTS. Eg. check if a user has tampered with a file. Detects any abnormal user behaviour, such as repeated changes to sensiti...
Data Rover EP Demo - Data Rover Security Reports
Concentrate on specific risk areas and deliver detailed analysis on the privileges that can be potentially incorrect or dangerous. Available Reports concentrate on the following permissions: Full Control, Delete, Change Permissions and Take Ownership.
Product Avatar Image

Have you used Data Rover EP before?

Answer a few questions to help the Data Rover EP community

Data Rover EP Reviews (4)

Reviews

Data Rover EP Reviews (4)

4.5
4 reviews

Pros & Cons

Generated from real user reviews
View All Pros and Cons
Search reviews
Filter Reviews
Clear Results
G2 reviews are authentic and verified.
BP
Senior Sales Associate
Leisure, Travel & Tourism
Mid-Market (51-1000 emp.)
"Effective method of protecting and storing data"
What do you like best about Data Rover EP?

Data Rover EP helps me to see the permissions of the specific user and it is useful for security analysis. It is good to know exactly who among the employees has access to certain sensitive information. Review collected by and hosted on G2.com.

What do you dislike about Data Rover EP?

The reports produced by Data Rover EP can be a chaos. They may not be well structured and one may take a lot of time to locate some vital information. This means that I end up browsing for hours just to look for the information that I need and this takes time to complete the audit. Review collected by and hosted on G2.com.

AR
Project Scheduler
Manufacturing
Mid-Market (51-1000 emp.)
"Helpful in classifying data"
What do you like best about Data Rover EP?

Data Rover EP has been quite beneficial in providing those insights into the corporate data topography. The capacity to audit and determine who has what access has been very useful in strengthening our security status. Review collected by and hosted on G2.com.

What do you dislike about Data Rover EP?

Data Rover EP has relatively limited collaboration capabilities. Ideally, you are not able to assign rights or restrictions for only certain people within the capacity of the software platform. Review collected by and hosted on G2.com.

Maximiliano M.
MM
Project Strategy Director
Computer Software
Mid-Market (51-1000 emp.)
"Distinguish valuable assets from non-critical data"
What do you like best about Data Rover EP?

Data Rover EP has been instrumental in assisting me with understanding client access designs inside our organization. I had the option to examine compelling consents and distinguish who got to what information is critical for keeping up with information security. Review collected by and hosted on G2.com.

What do you dislike about Data Rover EP?

Data Rover EP needs ongoing observing abilities. This implies I can't see dubious action as it works out. I depend entirely on authentic information examination, which can leave weaknesses. Review collected by and hosted on G2.com.

AA
Program Manager
Telecommunications
Mid-Market (51-1000 emp.)
"Gives an itemized review trail"
What do you like best about Data Rover EP?

Data Rover EP gives me a much more clear image of who approaches what information on our organization. This has been priceless for further developing security and consistence. Review collected by and hosted on G2.com.

What do you dislike about Data Rover EP?

The cycle for setting up granular access controls can be very unwieldy. It requires a great deal of manual setup, which is tedious and inclined to blunders, particularly for huge datasets. Review collected by and hosted on G2.com.

There are not enough reviews of Data Rover EP for G2 to provide buying insight. Below are some alternatives with more reviews:

1
Egnyte Logo
Egnyte
4.5
(1,131)
Egnyte delivers the only modern content platform that is purpose-built for businesses. Egnyte gives IT centralized control and protection over their files, and users fast access to their content, no matter how or where work happens.
2
BetterCloud Logo
BetterCloud
4.4
(478)
BetterCloud provides critical insights, automated management, and intelligent data security for cloud office platforms.
3
Veeam Data Platform Logo
Veeam Data Platform
4.6
(696)
Modernize your data protection and eliminate downtime with Veeam Data Platform, the simple, flexible, reliable and powerful solution for protecting your Cloud, Virtual and Physical workloads. It just works!
4
Check Point Next Generation Firewalls (NGFWs) Logo
Check Point Next Generation Firewalls (NGFWs)
4.5
(573)
Check Point Firewall. The Check Point Firewall Software Blade incorporates all of the power and capability of the revolutionary FireWall-1 solution while adding user identity awareness to provide granular event awareness and policy enforcement.
5
Check Point Harmony Email & Collaboration Logo
Check Point Harmony Email & Collaboration
4.6
(513)
Check Point Harmony Email & Office, protects enterprise data by preventing targeted attacks on SaaS applications and cloud-based email.
6
Paubox Logo
Paubox
4.9
(477)
Paubox is an easy way to send and receive HIPAA compliant email.
7
Virtru Email Encryption Logo
Virtru Email Encryption
4.4
(402)
Virtru puts you in charge of how your digital information is shared. Combining control, convenience, and simplicity, Virtru makes it easy to keep your private communications private.
8
Coro Cybersecurity Logo
Coro Cybersecurity
4.7
(231)
Monitors your cloud applications for data leaks, cyber-threats and regulatory violations that put your business at risk.
9
MineOS Logo
MineOS
4.8
(222)
MineOS is the end-to-end platform that helps companies streamline and automate their data privacy management for increased brand trust. By integrating endless data sources, companies can provide customers with transparency over their data, handle data privacy requests at scale, and simplify complying with privacy regulations globally, including GDPR, CCPA, CPRA, and LGPD. More information can be found here: https://saymine.com/business
10
Safetica Logo
Safetica
4.5
(195)
Safetica is an integrated Data Loss Prevention (DLP) and Insider Risk Management (IRM) solution, which helps companies to identify, classify, and protect sensitive data as well as detect, analyze, and mitigate risks posed by insiders within an organization. Safetica covers the following data security solutions: Data Classification - Safetica offers complete data visibility across endpoints, networks, and cloud environments. It classifies sensitive data using its Safetica Unified Classification, which combines analysis of file content, file origin and file properties. Data Loss Prevention - With Safetica, you can protect sensitive business- or customer-related data, source codes, or blueprints from accidental or intentional exposure through instant notifications and policy enforcement. Insider Risk Management - With Safetica, you can analyze insider risks, detect threats, and mitigate them swiftly. Notifications about how to treat sensitive data can help raise awareness around data security and educate your users. - Workspace and behavior analysis provides an extra level of detail to detect internal risks. It also helps understand how employees work, print, and use hardware and software assets, thus enabling organizations to optimize costs and increase operational efficiency. Cloud Data Protection - Safetica can monitor and classify files directly during user operations, such as exports, uploads and downloads, opening files, copying files to a different path, uploading files via web browsers, sending files via email or IM apps, and others. Regulatory compliance - Safetica helps organizations detect violations and comply with key regulations and data protection standards including GDPR, HIPAA, SOX, PCI-DSS, GLBA, ISO/IEC 27001, SOC2 or CCPA.
Show More

No Discussions for This Product Yet

Be the first to ask a question and get answers from real users and experts.

Start a discussion
Pricing

Pricing details for this product isn’t currently available. Visit the vendor’s website to learn more.

Product Avatar Image
Data Rover EP